Description

Security researcher Nils used the Address Sanitizer tool
while fuzzing to discover a memory corruption issue with the JavaScript engine
when using workers with direct proxies. This results in a potentially
exploitable crash.

In general this flaw cannot be exploited through email in the
Thunderbird and Seamonkey products because scripting is disabled, but is
potentially a risk in browser or browser-like contexts.